Voice Phishing Campaigns Using Access Keys

Oct 14, 2023

The phishing attack starts with an HTML file disguised as a voice message, which leads to the download of a file hosted on a disguised AWS URL. The attackers initially impersonate Zoom but later switch to spoofing Outlook and Teams login pages.

Get Free Report & Network Analysis

Please check your email for the free report.